Hide a message with steganography

Keyboard Shortcuts

Today there are hundreds of Steganography tools available. Join Lisa Bock as she demonstrates Steganography, using S-Tools. Observe how she takes two exact images, and then embeds a secret message in one and then encrypt the payload. See how the document has not visibly changed. Discover how you can reveal the secret document.

- [Voiceover] There are literally hundreds…of steganography tools available out there today.…However the one that I like to show…and is easy to follow along with is one of the original…steganography tools, which is called S Tools.…I'm at this website here, Professor Tennenbaum's website.…And here we can download S Tools so you can try it out.…I'll place my cursor right here…and download and save the zip file,…which I have done and unzipped it…and I placed it at my desktop.…

I've opened the folder where it's at…and it's at this icon right here, S Tools,…which is the application.…Let's open it.…I've also opened a picture folder…that's on my desktop and there are two small bit map files,…Jasper1 and Jasper2.…Now I've opened this because I want to show you…that these two images are exactly the same size…because I simply copied the one and made it into Jasper2.…I also have a secret text document there…and I'm going to put that into Jasper1.…

Now let's take a look.…I'll slide over Jasper1…and Jasper2.…I'm gonna resize the window but I'm gonna hold…

Resume Transcript Auto-Scroll

Author

Released

7/20/2016

System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools.